Читать книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple - Страница 28

Assessment Test

Оглавление

1 Which of the following types of access control seeks to discover evidence of unwanted, unauthorized, or illicit behavior or activity?PreventiveDeterrentDetectiveCorrective

2 Define and detail the aspects of password selection that distinguish good password choices from ultimately poor password choices.Is difficult to guess or unpredictableMeets minimum length requirementsMeets specific complexity requirementsAll of the above

3 Some adversaries use DoS attacks as their primary weapon to harm targets, whereas others may use them as weapons of last resort when all other attempts to intrude on a target fail. Which of the following is most likely to detect DoS attacks?Host-based IDSNetwork-based IDSVulnerability scannerPenetration testing

4 Unfortunately, attackers have many options of attacks to perform against their targets. Which of the following is considered a denial-of-service (DoS) attack?Pretending to be a technical manager over the phone and asking a receptionist to change their passwordWhile surfing the web, sending to a web server a malformed URL that causes the system to consume 100 percent of the CPUIntercepting network traffic by copying the packets as they pass through a specific subnetSending message packets to a recipient who did not request them, simply to be annoying

5 Hardware networking devices operate within the protocol stack just like protocols themselves. Thus, hardware networking devices can be associated with an OSI model layer related to the protocols they manage or control. At which layer of the OSI model does a router operate?Network layerLayer 1Transport layerLayer 5

6 Which type of firewall automatically adjusts its filtering rules based on the content and context of the traffic of existing sessions?Static packet filteringApplication-level gatewayCircuit-level gatewayStateful inspection firewall

7 A VPN can be a significant security improvement for many communication links. A VPN can be established over which of the following?Wireless LAN connectionRemote access dial-up connectionWAN linkAll of the above

8 Adversaries will use any and all means to harm their targets. This includes mixing attack concepts together to make a more effective campaign. What type of malware uses social engineering to trick a victim into installing it?VirusWormTrojan horseLogic bomb

9 Security is established by understanding the assets of an organization that need protection and understanding the threats that could cause harm to those assets. Then, controls are selected that provide protection for the CIA Triad of the assets at risk. The CIA Triad consists of what elements?Contiguousness, interoperable, arrangedAuthentication, authorization, accountabilityCapable, available, integralAvailability, confidentiality, integrity

10 The security concept of AAA services describes the elements that are necessary to establish subject accountability. Which of the following is not a required component in the support of accountability?LoggingPrivacyIdentification verificationAuthorization

11 Collusion is when two or more people work together to commit a crime or violate a company policy. Which of the following is not a defense against collusion?Separation of dutiesRestricted job responsibilitiesGroup user accountsJob rotation

12 A data custodian is responsible for securing resources after ______________ has assigned the resource a security label.Senior managementThe data ownerAn auditorSecurity staff

13 In what phase of the Capability Maturity Model for Software (SW-CMM) are quantitative measures used to gain a detailed understanding of the software development process?RepeatableDefinedManagedOptimizing

14 Which one of the following is a layer of the ring protection scheme design concept that is not normally implemented?Layer 0Layer 1Layer 3Layer 4

15 TCP operates at the Transport layer and is a connection-oriented protocol. It uses a special process to establish a session each time a communication takes place. What is the last phase of the TCP three-way handshake sequence?SYN flagged packetACK flagged packetFIN flagged packetSYN/ACK flagged packet

16 The lack of secure coding practices has enabled an uncountable number of software vulnerabilities that hackers have discovered and exploited. Which one of the following vulnerabilities would be best countered by adequate parameter checking?Time-of-check to time-of-useBuffer overflowSYN floodDistributed denial of service (DDoS)

17 Computers are based on binary mathematics. All computer functions are derived from the basic set of Boolean operations. What is the value of the logical operation shown here?X: 0 1 1 0 1 0Y: 0 0 1 1 0 1___________________X Å Y: ?0 1 0 1 1 10 0 1 0 0 00 1 1 1 1 11 0 0 1 0 1

18 Which of the following are considered standard data type classifications used in either a government/military or a private sector organization? (Choose all that apply.)PublicHealthyPrivateInternalSensitiveProprietaryEssentialCertifiedCriticalConfidentialFor Your Eyes Only

19 The General Data Protection Regulation (GDPR) has defined several roles in relation to the protection and management of personally identifiable information (PII). Which of the following statements is true?A data processor is the entity assigned specific responsibility for a data asset in order to ensure its protection for use by the organization.A data custodian is the entity that performs operations on data.A data controller is the entity that makes decisions about the data they are collecting.A data owner is the entity assigned or delegated the day-to-day responsibility of proper storage and transport as well as protecting data, assets, and other organizational objects.

20 If Renee receives a digitally signed message from Mike, what key does she use to verify that the message truly came from Mike?Renee's public keyRenee's private keyMike's public keyMike's private key

21 A systems administrator is setting up a new data management system. It will be gathering data from numerous locations across the network, even from remote offsite locations. The data will be moved to a centralized facility, where it will be stored on a massive RAID array. The data will be encrypted on the storage system using AES-256, and most files will be signed as well. The location of this data warehouse is secured so that only authorized personnel can enter the room and all digital access is limited to a set of security administrators. Which of the following describes the data?The data is encrypted in transit.The data is encrypted in processing.The data is redundantly stored.The data is encrypted at rest.

22 The __________ is the entity assigned specific responsibility for a data asset in order to ensure its protection for use by the organization.Data ownerData controllerData processorData custodian

23 A security auditor is seeking evidence of how sensitive documents made their way out of the organization and onto a public document distribution site. It is suspected that an insider exfiltrated the data over a network connection to an external server, but this is only a guess. Which of the following would be useful in determining whether this suspicion is accurate? (Choose two.)NACDLP alertsSyslogLog analysisMalware scanner reportsIntegrity monitoring

24 A new Wireless Application Protocol (WAP) is being installed to add wireless connectivity to the company network. The configuration policy indicates that WPA3 is to be used and thus only newer or updated endpoint devices can connect. The policy also states that ENT authentication will not be implemented. What authentication mechanism can be implemented in this situation?IEEE 802.1XIEEE 802.1qSimultaneous authentication of equals (SAE)EAP-FAST

25 When securing a mobile device, what types of authentication can be used that depend on the user's physical attributes? (Choose all that apply.)FingerprintTOTP (time-based one-time password)VoiceSMS (short message service)RetinaGaitPhone callFacial recognitionSmartcardPassword

26 A recently acquired piece of equipment is not working properly. Your organization does not have a trained repair technician on staff, so you have to bring in an outside expert. What type of account should be issued to a trusted third-party repair technician?Guest accountPrivileged accountService accountUser account

27 Security should be designed and integrated into the organization as a means to support and maintain the business objectives. However, the only way to know if the implemented security is sufficient is to test it. Which of the following is a procedure designed to test and perhaps bypass a system's security controls?Logging usage dataWar dialingPenetration testingDeploying secured desktop workstations

28 Security needs to be designed to support the business objectives, but it also needs to be legally defensible. To defend the security of an organization, a log of events and activities must be created. Auditing is a required factor to sustain and enforce what?AccountabilityConfidentialityAccessibilityRedundancy

29 Risk assessment is a process by which the assets, threats, probabilities, and likelihoods are evaluated in order to establish criticality prioritization. What is the formula used to compute the ALE?ALE = AV * EF * AROALE = ARO * EFALE = AV * AROALE = EF * ARO

30 Incident response plans, business continuity plans, and disaster recovery plans are crafted when implementing business-level redundancy. These plans are derived from the information obtained when performing a business impact assessment (BIA). What is the first step of the BIA process?Identification of prioritiesLikelihood assessmentRisk identificationResource prioritization

31 Many events can threaten the operation, existence, and stability of an organization. Some of those threats are human caused, whereas others are from natural events. Which of the following represent natural events that can pose a threat or risk to an organization?EarthquakeFloodTornadoAll of the above

32 What kind of recovery facility enables an organization to resume operations as quickly as possible, if not immediately, upon failure of the primary facility?Hot siteWarm siteCold siteAll of the above

33 During an account review, an auditor provided the following report:UserLast Login LengthLass Password ChangeBob4 hours87 daysSue3 hours38 daysJohn1 hour935 daysKesha3 hours49 daysThe security manager reviews the account policies of the organization and takes note of the following requirements:Passwords must be at least 12 characters long.Passwords must include at least one example of three different character types.Passwords must be changed every 180 days.Passwords cannot be reused.Which of the following security controls should be corrected to enforce the password policy?Minimum password lengthAccount lockoutPassword history and minimum agePassword maximum age

34 Any evidence to be used in a court proceeding must abide by the Rules of Evidence to be admissible. What type of evidence refers to written documents that are brought into court to prove a fact?Best evidenceParol evidenceDocumentary evidenceTestimonial evidence

35 DevOps manager John is concerned with the CEO's plan to minimize his department and outsource code development to a foreign programming group. John has a meeting scheduled with the board of directors to encourage them to retain code development in house due to several concerns. Which of the following should John include in his presentation? (Choose all that apply.)Code from third parties will need to be manually reviewed for function and security.If the third party goes out of business, existing code may need to be abandoned.Third-party code development is always more expensive.A software escrow agreement should be established.

36 When TLS is being used to secure web communications, what URL prefix appears in the web browser address bar to signal this fact?SHTTP://TLS://FTPS://HTTPS://

37 A new update has been released by the vendor of an important software product that is an essential element of a critical business task. The chief security officer (CSO) indicates that the new software version needs to be tested and evaluated in a virtual lab, which has a cloned simulation of many of the company's production systems. Furthermore, the results of this evaluation must be reviewed before a decision is made as to whether the software update should be installed and, if so, when to install it. What security principle is the CSO demonstrating?Business continuity planning (BCP)OnboardingChange managementStatic analysis

38 What type of token device produces new time-derived passwords on a specific time interval that can be used only a single time when attempting to authenticate?HOTPHMACSAMLTOTP

39 Your organization is moving a significant portion of their data processing from an on-premises solution to the cloud. When evaluating a cloud service provider (CSP), which of the following is the most important security concern?Data retention policyNumber of customersHardware used to support VMsWhether they offer MaaS, IDaaS, and SaaS

40 Most software vulnerabilities exist because of a lack of secure or defensive coding practices used by the developers. Which of the following is not considered a secure coding technique? (Choose all that apply.)Using immutable systemsUsing stored proceduresUsing code signingUsing server-side validationOptimizing file sizesUsing third-party software libraries

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Подняться наверх